Show plain JSON{"id": "CVE-2008-6365", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 7.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2009-03-02T16:30:00.687", "references": [{"url": "http://secunia.com/advisories/33072", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/32790", "tags": ["Exploit"], "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47282", "source": "cve@mitre.org"}, {"url": "https://www.exploit-db.com/exploits/7424", "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/33072", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/32790", "tags": ["Exploit"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47282", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.exploit-db.com/exploits/7424", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-89"}]}], "descriptions": [{"lang": "en", "value": "SQL injection vulnerability in logon.jsp in Ad Server Solutions Ad Management Software Java allows remote attackers to execute arbitrary SQL commands via the (1) username and (2) password, related to the uname or pass parameters to logon.jsp or logon_processing.jsp. NOTE: some of these details are obtained from third party information."}, {"lang": "es", "value": "Vulnerabilidad de inyecci\u00f3n SQL en logon.jsp en Ad Server Solutions Ad Management Software Java permite a atacantes remotos ejecutar comandos SQL de su elecci\u00f3n mediante el (1) usuario y (2) la contrase\u00f1a, relacionados con los par\u00e1metros \"uname\" o \"pass\" de logon.jsp o logon_processing.jsp. NOTA: algunos de estos detalles se han obtenido de informaci\u00f3n de terceros."}], "lastModified": "2024-11-21T00:56:21.110", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:adserversolutions:ad_management_software:-:java:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EFFCBDBC-38D0-404E-BF95-68568C074935"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}